Iot-Protocols-And-Security-1 Unit 2.1
Iot-Protocols-And-Security-1 Unit 2.1
Iot-Protocols-And-Security-1 Unit 2.1
The RFID protocols and data formats are relatively well defined,
mostly by EPCglobal (Electronic Product Code)
M2M • MSTF
Standardization is like a
double- edged sword: critical
to market development, but it
may threaten innovation and
inhibit change when standards
are accepted by the market.
Issues of IoT Standardization
IEEE 802.15.4
BacNet
ModBus
KNX
Zigbee
Wireless
• MODBUS Frames :
– ADU …Application Data Unit
– PDU …. Protocol Data Unit
ModBus
• MODBUS Frames :
– ADU …Application Data Unit
– PDU …. Protocol Data Unit
BACNet MS/TP
• Uses Twisted Pair EIA -485 upto 4000 feet
BACNet P2P
• Used only for dial-up telephone networks
KNx Protocol
KNX
• Abbreviation for KONNEX evolved from EHS
(European Home Systems Protocol), EIB
(European Installation Bus), BatiBUS
• Used for Building Automation
• Operates on more than one physical layer e.g
twisted pair wiring, Ethernet, infrared
• Every Unit hooked up to the KNX system is smart
enough and does not rely on other parts to
function
• KNX devices are sensors, actuators, system
devices.
KNX
• KNX Devices have 3 modes :
– A-mode(automatic)….Configure themselves
– E-mode (easy)…Require training to install
– S-mode(system mode)….must be programmed by
specialists.
• KNX network can be formed with tree, line
and star topologies
• This can Link upto 57,375 devices
KNX
• For Routing of messages KNX uses telegrams
Source Address • 4 bits- Area ID, 4 Bits- Line ID, 4 Bits- Device ID
Octets 2 2 1 1 Variable
:2
Frame Dest Sourc Radiu Seq Frame Payload
Contro Addr e s No
l Addr
Routing Fields
Initialization
• Establish connection, Sync Data, Read
configuration
Operation
• Device performs its designed task continuously
Update
• New Firmware arrives, device reboots, and
loads new frimware
IoT Device Life Cycle ….BootUp
Active Passive
• Wireless communication
• Physical insecurity
• Constrained devices Potentially sensitive data
• Lack of standards
• Heterogeneity: weakest link problem
• A systems, not software problem
• Classic web / internet threats
• Identity management & dynamism
• Inconvenience and cost
Attacks in Different Layers of IoT
1. Secure Boot
2. Authentication
3. Protected Ports ..Physical Security
4. Secure Storage
5. Secure Connections
Key Elements in IoT Security
Identity Establishment
• Use Public Key Cryptography
Access Control
• Define boundary of data access for devices…Data Access is done by Authentication
Security ..Authentication,
Confidentiality, Integrity, Availability
Trust …Repudiation